123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258 |
- Metadata-Version: 2.1
- Name: alibabacloud-credentials-py2
- Version: 0.0.3
- Summary: The alibabacloud credentials module of alibabaCloud Python2 SDK.
- Home-page: https://github.com/aliyun/credentials-python2
- Author: Alibaba Cloud
- Author-email: alibaba-cloud-sdk-dev-team@list.alibaba-inc.com
- License: Apache License 2.0
- Keywords: alibabacloud,sdk,tea
- Platform: any
- Classifier: Development Status :: 5 - Production/Stable
- Classifier: Intended Audience :: Developers
- Classifier: License :: OSI Approved :: Apache Software License
- Classifier: Programming Language :: Python :: 2
- Classifier: Programming Language :: Python :: 2.7
- Classifier: Topic :: Software Development
- Description-Content-Type: text/markdown
- Requires-Dist: alibabacloud-tea-py2
- English | [简体中文](README-CN.md)
- 
- # Alibaba Cloud Credentials for Python2
- ## Installation
- - **Install with pip**
- Python SDK uses a common package management tool named `pip`. If pip is not installed, see the [pip user guide](https://pip.pypa.io/en/stable/installing/ "pip User Guide") to install pip.
- ```bash
- # Install the alibabacloud_credentials_py2
- pip install alibabacloud_credentials_py2
- ```
- ## Usage
- Before you begin, you need to sign up for an Alibaba Cloud account and retrieve your [Credentials](https://usercenter.console.aliyun.com/#/manage/ak).
- ### Credential Type
- #### access_key
- Setup access_key credential through [User Information Management][ak], it have full authority over the account, please keep it safe. Sometimes for security reasons, you cannot hand over a primary account AccessKey with full access to the developer of a project. You may create a sub-account [RAM Sub-account][ram] , grant its [authorization][permissions],and use the AccessKey of RAM Sub-account.
- ```python
- from alibabacloud_credentials.client import Client
- from alibabacloud_credentials.models import Config
- config = Config(
- type='access_key', # credential type
- access_key_id='accessKeyId', # AccessKeyId
- access_key_secret='accessKeySecret', # AccessKeySecret
- )
- cred = Client(config)
- access_key_id = cred.get_access_key_id()
- access_key_secret = cred.get_access_key_secret()
- cred_type = cred.get_type()
- ```
- #### sts
- Create a temporary security credential by applying Temporary Security Credentials (TSC) through the Security Token Service (STS).
- ```python
- from alibabacloud_credentials.client import Client
- from alibabacloud_credentials.models import Config
- config = Config(
- type='sts', # credential type
- access_key_id='accessKeyId', # AccessKeyId
- access_key_secret='accessKeySecret', # AccessKeySecret
- security_token='securityToken' # STS Token
- )
- cred = Client(config)
- access_key_id = cred.get_access_key_id()
- access_key_secret = cred.get_access_key_secret()
- security_token = cred.get_security_token()
- cred_type = cred.get_type()
- ```
- #### ram_role_arn
- By specifying [RAM Role][RAM Role], the credential will be able to automatically request maintenance of STS Token. If you want to limit the permissions([How to make a policy][policy]) of STS Token, you can assign value for `Policy`.
- ```python
- from alibabacloud_credentials.client import Client
- from alibabacloud_credentials.models import Config
- config = Config(
- type='ram_role_arn', # credential type
- access_key_id='accessKeyId', # AccessKeyId
- access_key_secret='accessKeySecret', # AccessKeySecret
- security_token='securityToken', # STS Token
- role_arn='roleArn', # Format: acs:ram::USER_ID:role/ROLE_NAME
- role_session_name='roleSessionName', # Role Session Name
- policy='policy', # Not required, limit the permissions of STS Token
- role_session_expiration=3600 # Not required, limit the Valid time of STS Token
- )
- cred = Client(config)
- access_key_id = cred.get_access_key_id()
- access_key_secret = cred.get_access_key_secret()
- security_token = cred.get_security_token()
- cred_type = cred.get_type()
- ```
- #### ecs_ram_role
- By specifying the role name, the credential will be able to automatically request maintenance of STS Token.
- ```python
- from alibabacloud_credentials.client import Client
- from alibabacloud_credentials.models import Config
- config = Config(
- type='ecs_ram_role', # credential type
- role_name='roleName' # `roleName` is optional. It will be retrieved automatically if not set. It is highly recommended to set it up to reduce requests.
- )
- cred = Client(config)
- access_key_id = cred.get_access_key_id()
- access_key_secret = cred.get_access_key_secret()
- security_token = cred.get_security_token()
- cred_type = cred.get_type()
- ```
- #### rsa_key_pair
- By specifying the public key ID and the private key file, the credential will be able to automatically request maintenance of the AccessKey before sending the request. Only Japan station is supported.
- ```python
- from alibabacloud_credentials.client import Client
- from alibabacloud_credentials.models import Config
- config = Config(
- type='rsa_key_pair', # credential type
- private_key_file='privateKeyFile', # The file path to store the PrivateKey
- public_key_id='publicKeyId' # PublicKeyId of your account
- )
- cred = Client(config)
- access_key_id = cred.get_access_key_id()
- access_key_secret = cred.get_access_key_secret()
- security_token = cred.get_security_token()
- cred_type = cred.get_type()
- ```
- #### bearer
- If credential is required by the Cloud Call Centre (CCC), please apply for Bearer Token maintenance by yourself.
- ```python
- from alibabacloud_credentials.client import Client
- from alibabacloud_credentials.models import Config
- config = Config(
- type='bearer', # credential type
- bearer_token='bearerToken', # BearerToken
- )
- cred = Client(config)
- access_key_id = cred.get_access_key_id()
- access_key_secret = cred.get_access_key_secret()
- security_token = cred.get_security_token()
- cred_type = cred.get_type()
- ```
- ### Use the default credential provider chain
- ```python
- from alibabacloud_credentials.client import Client as CredClient
- from alibabacloud_ocr20191230.client import Client as OcrClient
- from alibabacloud_ocr20191230.models import GetAsyncJobResultRequest
- from alibabacloud_tea_rpc.models import Config
- from alibabacloud_tea_util.models import RuntimeOptions
- cred = CredClient()
- config = Config(credential=cred)
- client = OcrClient(config)
- request = GetAsyncJobResultRequest(
- job_id='<job_id>'
- )
- runtime_options = RuntimeOptions()
- response = client.get_async_job_result(request, runtime_options)
- ```
- The default credential provider chain looks for available credentials, with following order:
- 1.Environment Credentials
- Look for environment credentials in environment variable. If the `ALIBABA_CLOUD_ACCESS_KEY_ID` and `ALIBABA_CLOUD_ACCESS_KEY_SECRET` environment variables are defined and are not empty, the program will use them to create default credentials.
- 2.Credentials File
- If there is `~/.alibabacloud/credentials default file (Windows shows C:\Users\USER_NAME\.alibabacloud\credentials)`, the program automatically creates credentials with the specified type and name. The default file is not necessarily exist, but a parse error will throw an exception. The name of configuration item is lowercase.This configuration file can be shared between different projects and between different tools. Because it is outside of the project and will not be accidentally committed to the version control. The path to the default file can be modified by defining the `ALIBABA_CLOUD_CREDENTIALS_FILE` environment variable. If not configured, use the default configuration `default`. You can also set the environment variables `ALIBABA_CLOUD_PROFILE` to use the configuration.
- ```ini
- [default] # default setting
- enable = true # Enable,Enabled by default if this option is not present
- type = access_key # Certification type: access_key
- access_key_id = foo # Key
- access_key_secret = bar # Secret
- [client1] # configuration that is named as `client1`
- type = ecs_ram_role # Certification type: ecs_ram_role
- role_name = EcsRamRoleTest # Role Name
- [client2] # configuration that is named as `client2`
- enable = false # Disable
- type = ram_role_arn # Certification type: ram_role_arn
- region_id = cn-test
- policy = test # optional Specify permissions
- access_key_id = foo
- access_key_secret = bar
- role_arn = role_arn
- role_session_name = session_name # optional
- [client3] # configuration that is named as `client3`
- type = rsa_key_pair # Certification type: rsa_key_pair
- public_key_id = publicKeyId # Public Key ID
- private_key_file = /your/pk.pem # Private Key file
- ```
- 3.Instance RAM Role
- If the environment variable `ALIBABA_CLOUD_ECS_METADATA` is defined and not empty, the program will take the value of the environment variable as the role name and request <http://100.100.100.200/latest/meta-data/ram/security-credentials/> to get the temporary Security credentials.
- ## Issues
- [Opening an Issue](https://github.com/aliyun/credentials-python2/issues/new), Issues not conforming to the guidelines may be closed immediately.
- ## Changelog
- Detailed changes for each release are documented in the [release notes](./ChangeLog.md).
- ## References
- * [Latest Release](https://github.com/aliyun/credentials-python2)
- ## License
- [Apache-2.0](http://www.apache.org/licenses/LICENSE-2.0)
- Copyright (c) 2009-present, Alibaba Cloud All rights reserved.
|